Sciweavers

4359 search results - page 225 / 872
» Automated Pipeline Design
Sort
View
CCS
2005
ACM
15 years 10 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
153
Voted
EDOC
2003
IEEE
15 years 9 months ago
A Software Architecture for Industrial Automation
The Aspect Integrator Platform (AIP) from ABB was designed to build the next generation of industrial automation applications. This platform is part of a set of products that prov...
Rodrigo García García, Esther Gelle,...
SIGUCCS
2009
ACM
15 years 9 months ago
Automated lecture recording system with AVCHD camcorder and microserver
Although recording and streaming lecture videos is becoming popular, large-scale lecture recording is still a difficult task for many universities. Auto lecture recording systems ...
Takayuki Nagai
DIM
2008
ACM
15 years 5 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
AES
2008
Springer
182views Cryptology» more  AES 2008»
15 years 4 months ago
Logical product models for automated scripting of process-level construction animations
Animation can add significant value to Discrete-Event Simulation by helping verify, validate, and accredit simulation analyses. This is particularly true in construction where typ...
Vineet R. Kamat